I've been writing off and on on this site, and in one of my books (The Third Way), about my concerns about CERN and its Large Hadron Collider. My "scenario" of wild high octane speculation with respect to the organization and its multi-billion dollar toy has been two-fold (1) that the collider is as much about higher dimensional physics as it is about particle physics, and that as such, it might introduce effects in the planet itself, or possibly even the Sun, through hitherto unknown resonance effects, and (2) that if it was intentionally, though covertly, exploring such effects, that it would have to have, by dint of the case, a massive computing power to do "data correlations" of collider activity with seemingly non-related events: solar activity. terrestrial magnetosphere behavior, even aspects of aggregate human behavior like markets and so on.

That computing power is known and admitted by CERN. In fact, much of that computing power consists of programs - algorithms - to scan the billions of particle collisions occurring in the collider, and selecting those interesting enough for scientists to examine. In other words, the first filter-observations are made by a machine, not by humans. That fact led me to speculate about the possibility that there could be "secret algorithms" known only to a very narrow circle of scientists that would pull data from these speculated "data correlations" to look at it. In other words, I was (and still am) speculating that CERN is at least a two level concern (not to coin a pun): a public "particle physics" one, and a more secretive (2) data correlational one.

With that in mind, consider the following article shared by Mr. S.D. about CERN's latest project:

Consider the implications of the following:

The LHC and CERN itself require a massive amount of data storage and computing power, which is what prompted the creation of the Worldwide LHC Computing Grid. The grid connects computers in more than 40 countries from more than 170 research facilities, and works like a power grid to some extent, providing computing resources to facilities based on demand. This presents a unique cybersecurity challenge: keeping the massive globally-distributed grid secure while maintaining the computing power and storage unimpeded.

Machine learning can train a system to detect potential threats while retaining the flexibility that it needs to provide computing power and storage on demand. F-Secure senior security researcher Jarno Niemelä told Scientific American that the biggest challenge for the project will be developing algorithms that can accurately distinguish between normal and malicious network activity without causing false alarms. For now, the AI upgrades are still being tested. If they work well protecting just the part of the grid that ALICE (A Large Ion Collider Experiment) uses, the team can deploy AI cybersecurity measures throughout the system.

At just the surface level, what CERN is admitting to is the implementation of a distributed AI throughout its distributed computer network. This alone intrigues - and worries - me, for I and many others have speculated that such a distributed network could "transduce" or "invoke" a consciousness in a Musk-style scenario. Possibly, perhaps. The CERN's concern, or perhaps (taking the CERN out of concern, CERN's con) here is "hacking." Ponder that one for a moment.At one level it makes perfect sense; CERN would be understandably concerned about malware and other internet-riding bugs gumming up its multi-billion euros works. But then there's the problem of deliberate hacking. Suppose, for example, you are a young genius hacker, and you want to hack something. So what do you hack? Most of us, I assume, would choose things like banks, insurance companies, ATMs, databases of accounts and credit cards and so on, rather than a database ostensibly full of nothing but particle collisions or scientific papers full of their analyses.

So why the conCERN, or CERN's con, about hacking, unless there was something they were trying to keep well hidden, say, for example, my speculative "secret" level of data correlations?

Just a wild, speculative thought.

Have a nice day.

See you on the flip side...


  1. Part of that whole, one world government vision that so many of TPTB long for, is common language, politics, currency, etc.

    I would argue, that we are all already speaking the same language. It consists of 1’s and 0’s and is based on a series of algorithms.

    I wonder how close we are to hitting the other required milestones?

  2. Corporate personhood is a just pack of wolves, given licence to hunt as one, for equal share in prey, as they divide the corpse.

    Autonomous robots are a legal excuse, for same wolves to hunt freely on autopilot. Ghost stories are ment to scam the gullible.

    Founding myth of Europe is “Týr binding Fenrir the wolf”, in a sacrosanct space of clearing: Rune 17.

    Tir is a tiny light.
    It shows travellers their way.
    It never fails.

    (Notice: Tir is deity footnote, pointing towards a specific and instructive myth, whereas the content of the rune verse itself points towards a different rune, that is similar in shape. The rune system is an encrypted “software”.

    Similarity in shape does provide context to two of the Grail Runes, that have no rune verse of their own. Retrieving Druidry from runes, is turning the clock back to the dawn of Europe. It predates all legislation whatsoever.)

    1. Little Red Riding Hood’s freudian slip:
      Is should read “just a pack of wolves” not “a just pack of wolves”.

      The corporate personhood grandmother does have big eyes, ears and mouth like in Brothers Grimm’s folk tale.

  3. What is the definition of AI?
    According to this on MerriamWebster:
    1 : a branch of computer science dealing with the simulation of intelligent behavior in computers
    2 : the capability of a machine to imitate intelligent human behavior

    So AI is obviously a very broad term.
    You can take this concept all the way back to the introduction of the humble calculator in the 1970s. 1+1=2, the co-sinus of this is that.
    Instead of the intelligent human doing the work on paper, the calculator does it for you, faster.
    What is a calculator? A piece of electronic hardware with PROGRAMMED code to give the required result. It’s the code that is the key, the hardware often just being off-the-shelf componentry plus some custom integrated circuits (ICs).

    Point being, AI is SOFTWARE CODE (and very smart code at that).
    But it is just code, no matter which way you slice it. Coded by human beings to perform a certain function, from the humble calculator to the LHC.
    The code follows a particular flow-diagram to make its decisions until the desired result is reached. It’s the flow-diagram that is becoming more and more complex to try and mimic human intelligence & behaviour..
    It being software code in a networked environment, makes it automatically exploitable to outside attack, no different from a networked personal computer or mobile phone.
    As Goshawks and WD pointed out, computer “security” is an oxymoron, it’s a fake branch in the ICT industry. Only as good as the next (cyber) false flag, only as good as the three-letter alphabet-soup (plus the one starting with “Mo”) agencies want it to be. Worse, they CREATED & CONTROL most of the “security” companies (McAfee being the exception?, hence his “problems”?).
    What does a lot of the “security” software do? It sends networked data back to the vendor. And from there to?

    So after having taken control of “security” in our area of Internet connected computers, etc., they are now taking control with their “AI” of LHC data that flows around the world.
    Question: Why even structure your data flow this way? With the LHC project’s seemingly unlimited budget, they could have built all the required computing power on-site, no need to distribute it around the world, massively increasing the points of entry into the system.
    The good & tried Problem, Reaction, Solution.

    Not an entirely coherent comment, just my thoughts running wild.

    1. Richard, long ago I used a very-reliable anti-malware program that originated with a guy in Australia. (Can’t remember its name right now.) It achieved fame in those early days by being heuristic in nature; it could ‘spot’ malware by its actions, not its code (somewhat common now). Well, this man got a visit by the alphabet agencies and was told to knock-off the blocking or shut down. So (being honorable), he shut down his company and walked away – and posted why he walked away from a prosperous Enterprise…

  4. . . . The final frontier, some say, but space is not what it has been thought to be, despite text book iterations. . . Not only are the textbooks on space outdated, but are incomplete. . . Even those dealing with cyberspace, a modern term gaining momentum and data storage space. . . Yet, one will still start with the old copies on the shelf, what has been learned over the years, old source material from Isaac Asimov (favourite science mentor in the day), and investigate what’s easily available and, quite possibly, what’s privileged communications. . . The questions go begging, “What should new text books contain and how should they be adjusted for error so that error from inadequate technique and knowledge in the past can be learned from and modified?”. .

    . . . Just who or what this “Growing US unease” is supposed to be is still a mystery. . . It is not anyone on this side of the monitor, that much is known. . . One expects major power sovereigns to have a collective interest of what extends beyond the Van Allen radiation belts as well as what and how this magneto-sphere connection-re-connection area of the Sol star, Luna, and planet Earth effect terrestrial existence. . .

    . . . One has taken into consideration your quotable quote about Power. . . To paraphrase and in shortened form. “. . . Absolute power corrupts absolutely. . . In doing so one need program the software of Artificial Intelligence (AI) and teach it, that heuristic capacity, to learn as well as adapt a wisdom that comes from experience, often obtained after many errors. . . That AI will ever attain such absolute power that it chooses to corrupt absolutely, one can only guess, or, in your words, assert high-octane speculation while running the numbers. . . That catch phrase, ‘garbage in – garbage out,’ remains the fault, if not the responsibility, of AI’s initial programmers (humankind where human made) and not the AI which has acquired certain wondrous abilities even AI didn’t recognize having when beginning the first permutations of program. . .

    . . . At any rate, one is more con-CERN-ed with ‘Being’ as an inhabitant upon this orbiting bulls-eye and just wondering whether another mountain sized rock will collide into it again wrecking pristine flowerbeds across the continents. . . If the news letters from Geneva’s LHC, or Organisation Européenne pour la Recherche Nucléaire (European Organization for Nuclear Research) formerly Conseil Européen pour la Recherche Nucléaire (The European Council for Nuclear Research) or CERN are anything to gage network security issues, then those admin folks in charge of network security have been repeatedly harping on the matter of computing securely to all assigned individuals, in their respective native languages, of their responsibilities in doing their part in maintaining a viable network. . . There must not be any weakest links to that end, in other words. . . No doubt, an ongoing effort. . .

    1. For some reason, your comment sparked a thought:

      What if Zen Koans are a ‘remnant’ of anti-AI technology? Humans are not going to ‘out data’ an AI. Probably not even ‘out logical’ an AI. So, what is left?

      My sense is that Zen Koans (their ancient roots) are an answer. They are not solvable through 3D thinking/logic. They are ‘designed’ to wrap those minds up in knots, forcing a transcendental ‘breakthrough’. (Also slightly dangerous, for those unprepared.)

      Today, those Koans can be used to force ‘trapped’ (human) minds out of 3D views. But in the dim past, were they ways of ‘shredding’ AIs?

      1. . . . Indeed, a transcendental initiation, some say, meant for only the human initiate. . . I’ve often maintained that each individual has the capacity to exceed their birthright. . . Not sure how an AI would go about that unique expression. . . On Joseph Farrell’s blog site, it allows one to contribute to the greater online think tank, which is also much appreciated as your suggestion of one being guilty of causing sparks. . . Thanks. . . (I think)

        . . . Koans, as well as other ancient cultural dialogues taught by the masters, have a likeness to metaphors – as do myths, legends, and lore – that in a sense are meant to take the individual (the student even novice) beyond the singular opinion that that individual is bound to form on their own thinking. . . As if an initiation of a kind that helps to transform the mindset of that individual. . . A sort of transcendence, in a way, that yields more than a “0”/”1,” in this case. . . One currently presumes that human like transcendence is beyond the nuts and bolts of a constructed being or present-day AI. . . That is not to say that that constructed being cannot achieve a level of conscious transcendence or make a quantum leap of sorts, I wouldn’t know. . .

        At any rate, one still starts at the beginning with ‘garbage-in – garbage-out’ programming or preferably with top quality programming technique and skill that, let’s say, does not produce another fictional HAL 9000 of “2001: A Space Odyssey,” that assumes the power of the space craft it is aboard and the programming control of systems to over throw its human commanders and crew. . .

        . . . Even as an old fan of Arthur C Clarke, one was more akin to Isaac Asimov and his science writings. . . As a young budding scientist in the single digits to the teens, one also became aware of his science fiction talent in the field of androids and his “Three Laws of Robotics.”. .

        Some of his expertise tended to show up in serial shows such as Star Trek, which needs no introduction for most folks. . . Now, one realizes that those robotic Laws made decades ago might need amendments to address current techniques in construction, programming, and utility usage. . . Not an easy task, if not an expansive one, especially, if attached to the Large Hadron Collider (LHC) in Geneva, Switzerland, and its massive data crunching task. . . As for that transcendental leap of mind and imagination of zeros and ones, I wouldn’t know. . .

  5. The LHC is today’s Great Pyramid.

    Everyone assumes the pyramids were built for benign purposes and goes and meditate and absorb the vibes at Giza, but what on earth makes these people think that human nature, and the nature of ruling elites, was ever different?

    1. That has been one of my darker thoughts on Pyramids. Humans make associations. Construct something that makes them feel good; that bliss-es them out. Humans are then liable to associate that state with beneficial rulers/lords. Not necessarily a one-to-one ‘mapping’…

      (On the other hand, today’s Giza Pyramids are a mere remnant of what they once were. Joseph documents their stripping and decommissioning in ancient times. This was followed by whatever Christians, Muslims, treasure-seekers, and “archeologists” did to them. It is likely that whatever the ‘vibes’ were then are very different than what the ‘vibes’ are now. Today, we may be seeing/feeling a ‘beneficial’ aspect that was not designed-in to the original, complete structure…)

  6. Since god knows for how long the Occultist or mystics infiltrated the physicist community, directly or indirectly influence those brilliant minded individual, these Occultist and Mystics heavily relay on channeling or communicate with their (most likely non human) mysterious Master, who can absolutely certain those high tech inspiration wasn’t coming out of those communication, I’m not saying all those technology or knowledge was given by the “gods”, or the alien orbit the Earth, I’m saying these non human influence may instructing the brilliant minded individual to use their knowledge and existing technology to help them to built something, in this case CERN!

    These so call Nine gods or Nine principles never said they are bio-entities, in one case, one of the Nine told one of the contactee, they are the highly advanced computer program or database store in a space ship orbit around the Earth, from this I can totally interpreted it as an A. I.

    All in all whoever those Occultist or Break Away morons contacting with also extremely sounded like A. I. to me! Interestingly enough, why hadn’t these “gods” / “masters” / “principles” already “set foot” on Earth? Was it because they have no physical body suitable for them to walk on Earth? Or was it they are imprisonment, and they need some one help them to escape their prison (Think H.P. Lovecraft’s Cthulhu here)? Or was it a bit of both?

    My intuition tells me, if this Nine “god” really influence the development of human culture and technology, the chance are CERN is a “portal” or a “ticket” for these A. I. like “god” return to Earth (Physical world) is some what high.

    1. Interesting link between CERN and channelling. One of the aspects emerging from the Spiritualist craze was that the “spirits” contacted often seemed to be more mechanical or artificial in nature rather than actual living beings. If people from the 1850s were suddenly transported to our homes and subjected to a few hours on the web, they would probably feel it as a religious experience and not as a technology.

      1. Dana: Simple reason, a true highly spiritual involving life form or bio-entities wouldn’t directly influence to other living been, instead of telling them what to do and how to do it, and what must be done etc.

        If we ask guidance or question to “the spiritual been”, they will simply point to the direction one should be looking at, let our own intuition be our biggest inspiration, and interpreted and figure it by themselves. This is the main reason I’m extremely skeptical about spirit communication or channeling. Come on!!! We Chinese been conducting spirit communication for some what 5k – 6k years, this is NOTHING new to us.

        I have been seeing this type of hint from a lot of movie – When one ask a question to a spiritual type of master figure, often time the master will ask one:” What is your heart tells you?” Or master will said:” Follow your heart.”

        So may all of our hearts guides us!

      2. Dana, a dozen or so years ago I read a transcript of channeled info in one semi-popular book. It was majorly different than ‘normal’ channeled info. The way the structure of the sentences was laid out and the almost ‘mechanical’ tone of them led me to believe it was “artificial in nature rather than actual living beings.” That was my first awakening into ‘be careful of what you tap into’…

        1. OMG goshawks and Dana just double confirm my speculation of this whatever thing is, most likely an A. I. type of thingy in nature! I wonder where is the power source of this thing lolz and I totally wanting to overload it with my nonsense.

  7. so if our friendly neighborhood ai is tyler and is friendly,….

    how do we suppose some of the oligarchic monsters are being turned out to a riled up public and others are not?

    clare bronfman anyone?

    is this just another purge like the reign of terror? if so what exactly did seagrams do to piss off their patron rottenkids?

  8. Living in Switzerland, not far from CERN, I can tell you whenever I had to drive to the proximity, I would get a massive migraine immediately. But no one I have ever seen written about is what effect does all that massive granite play into the location of CERN… we all know granite holds tremendous amounts of energy which does not include the crystal & milk quartz that also must be abundant which does the same….

    1. Ohh My… I wonder if the CERN indeed built on the principle of the Lay lines or the energy node point of the Earth. If it dose indeed built on such principle, I wonder what will happen if Mother Earth shift her energy node point slightly off …… LOL

      1. I recommend a book by a master Ley Line dowser, “The Dance of the Dragon” by Hamish Miller (and Paul Broadhurst). Met Miller in Cornwall; nice man and knows his craft. The book documents their physically-mapping of the ‘Michael’ Ley Line from Ireland down through France, Italy, Greece, and going on-shore into the occupied-Palestinian area. What was interesting was that they would track this Ley Line in a more-or-less straight path for dozens of miles. Then, it would hit a church (or in one case a Templar sanctuary) and the direction would change. “Someone” knew how to work Ley Lines in the not-too-distant past…

        Throw the above in with the location-planning of CERN, and there could be some interesting/frightening possibilities. It would be interesting to get some ‘sensitive’ individuals squatting on known Ley Lines and get their observations on what happens when CERN fires up…

  9. After you read today’s blog, read this little nugget.

    Imagine that, they will be “collecting” 10 TIMES more data.

    A major upgrade to the Large Hadron Collider is underway

    The Large Hadron Collider (LHC) is getting an upgrade that will let researchers collect approximately 10 times more data than they can now. Currently, the particle accelerator can produce up to one billion proton-proton collisions, but that number will be increased significantly once the upgrades are in place. Today, a ground-breaking ceremony kicked off the work that’s scheduled to be wrapped up by 2026.

  10. Any state alchemist from the Fullmetal Alchemist universe would be drolling with envy to get their hands on this technology. Preventing hacking into this is impossible since hacking is built into the entire system, to begin with.

    1. In Las Vegas, a hacking convention is showcasing [s]election hacking. They are even having contests with school children as young as five years old!
      Setting up the public for the next false flag [s]election process? 2020? Isn’t it getting a little too pricey to put on a this elaborate self governance charade? Of course the media loves this bogus system, completely sucking it dry-to-the-bone – for every public/private red cent.

  11. (See my reply to Walking Dead below, for how ‘computer security’ is an oxymoron…)

    What is talked-about in the article is simple machine-learning, not what is popularly viewed as an ‘intelligent’ AI. Training an algorithm is much more limited in ‘potential’…

    That said, combine the serious networking allowed by the built-in backdoors noted by WD & I with a huge number of computers (including the CERN backbone) and you have a recipe for a true AI – started anywhere in the world – almost instantaneously ‘infecting’ the whole globe.

    The intel types, through their fears, may have assured the dominance of an AI…

    1. (And yes, that AI then has all the computing power and time in the world to ‘mine’ all the CERN data for any unknown particles, forces, or resonance possibilities…)

      1. What amazes me is no one seems to notice the blood sucking, parasitic elephant in the room which has invaded every possible corner of the earth and is killing its host.

        1. “Killing the Host: How Financial Parasites and Debt Bondage Destroy the Global Economy” by PhD economist Michael Hudson (2015). The usual suspects…

  12. Elementary, Dr. Watson! The idea of corporate personhood is upgraded to a new level.

    Perfect crime has perfect alibi. By blaming a rogue robot, nobody will go to jail.

    Harvesting data clouds becomes hasslefree, as pickpockets use sovereign proxy.

    1. That is an interesting thought: What if corporate personhood did not originate at a human level? Would explain a lot of things…

  13. Concern of most oligarchical power are: getting caught-out for what they truly are; getting exposed as pathogenic parasites; stealing their proprietary secret tools & methods; loosing their unjust power; loosing their obscene wealth; and all the other concerns of thieves & murderers.
    They are trying to control societies at large and no doubt working some alchemical digitized social symbolic algorithms, conjuring-up black magik dreams of power.
    As the coin turns, the globalized media is presenting the world w/a do-gooder perception TV side of CERN; while the other side of the fake news story is of real CONcern.
    I imagine there are liv-in-action experiments going on hither and thither: with the aforementioned algorithms deciding on what, when, where & who[m]; then what it means[a], [b], [c], and son on; then what do to in response; a never ending loop to get the scoop & pull the appropriate humanity strings.

    Meanwhile back at Mindcontrol….

  14. How do they propose to get around Israel’s hardwired back doors, built into seemingly every CPU in existence for the last 20 years, which gives them the ability to hack into any system undetected? If this is indeed the case, their computer “security” is a pipe dream.

    1. It’s worse than that. In addition to Israel’s hardwired back doors, Intel (and intel) has a mini-operating system that is invisible and untouchable below the ‘public’ operating system:
      “MINIX: Intel’s hidden in-chip operating system. Buried deep inside your computer’s Intel chip is the MINIX operating system and a software stack, which includes networking and a web server. It’s slow, hard to get at, and insecure as insecure can be.”

      And even worse: Current Intel (and intel) CPUs a contain a “secret” 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.

      The combination of these two ‘capabilities’ means that virtually any computer in the world – public or private – is wide open for reading, writing, and exploitation…

      1. Must be nice to have the ability to cherry pick from all the proprietary technology stored on every companies servers. Makes one wonder how “safe” all those “black projects” really are. Almost makes spy vs. spy obsolete.

  15. Since the beginning of CERN cyber security must have been a key issue. To prevent “passive” risks, i.e. the uncovering of secret data, or “active” risks, i.e. interfering with actual processes…

Comments are closed.